{"id":2087,"date":"2012-10-07T02:11:40","date_gmt":"2012-10-07T00:11:40","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=2087"},"modified":"2012-10-07T02:13:39","modified_gmt":"2012-10-07T00:13:39","slug":"les-risques-lies-a-la-virtualisation-des-systemes-dinformation","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=2087","title":{"rendered":"Les risques li\u00e9s \u00e0 la virtualisation des syst\u00e8mes d&#8217;information"},"content":{"rendered":"<p style=\"text-align: justify;\">La virtualisation des serveurs informatiques est une pratique de plus en plus r\u00e9pandue. Elle permet de r\u00e9aliser des \u00e9conomies et gains de place. Toutefois, les entreprises ne sont pas toujours conscientes des risques propres \u00e0 cette technique.<\/p>\n<p style=\"text-align: justify;\">L&#8217;ANSSI (Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information) a publi\u00e9 un guide pr\u00e9sentant les risques et les moyens de s&#8217;en pr\u00e9munir.<\/p>\n<p style=\"text-align: justify;\">Le guide est t\u00e9l\u00e9chargeable \u00e0 l&#8217;adresse suivante : <a title=\"Probl\u00e9matiques de s\u00e9curit\u00e9 associ\u00e9es \u00e0 la virtualisation des syst\u00e8mes d\u2019information\" href=\"http:\/\/www.ssi.gouv.fr\/fr\/bonnes-pratiques\/recommandations-et-guides\/securite-du-poste-de-travail-et-des-serveurs\/problematiques-de-securite-associees-a-la-virtualisation-des-systemes-d.html\" target=\"_blank\">Probl\u00e9matiques de s\u00e9curit\u00e9 associ\u00e9es \u00e0 la virtualisation des syst\u00e8mes d\u2019information<\/a>.<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20risques%20li%C3%A9s%20%C3%A0%20la%20virtualisation%20des%20syst%C3%A8mes%20d%27information\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>La virtualisation des serveurs informatiques est une pratique de plus en plus r\u00e9pandue. Elle permet de r\u00e9aliser des \u00e9conomies et gains de place. Toutefois, les entreprises ne sont pas toujours conscientes des risques propres \u00e0 cette technique. L&#8217;ANSSI (Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information) a publi\u00e9 un guide pr\u00e9sentant les risques et les &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=2087\" class=\"more-link\">Continue reading &lsquo;Les risques li\u00e9s \u00e0 la virtualisation des syst\u00e8mes d&#8217;information&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20risques%20li%C3%A9s%20%C3%A0%20la%20virtualisation%20des%20syst%C3%A8mes%20d%27information\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,35,24,33],"tags":[1076,1075,473,125,99,595,483,629,43,25,137,150,140,1628,778,529,1074],"class_list":["post-2087","post","type-post","status-publish","format-standard","hentry","category-breves","category-securite-informatique","category-systeme-dinformation","category-systeme-informatique","tag-anssi","tag-cloisonnement","tag-cloud-computing","tag-continuite-dexploitation","tag-faille-de-securite","tag-fuite-de-donnees","tag-indisponibilite-des-systemes","tag-informatique-dans-les-nuages","tag-integrite-des-donnees","tag-nouvelles-technologies","tag-politique-de-securite","tag-prevention","tag-risque-informatique","tag-securite-informatique","tag-serveur","tag-virtualisation","tag-vulnerabilites"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/2087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2087"}],"version-history":[{"count":5,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/2087\/revisions"}],"predecessor-version":[{"id":2091,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/2087\/revisions\/2091"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}